Security

StackRox today extended the scope of a container security platform for Kubernetes to include a deployment-centric view of their environment to provide more context about potential risks. Wei Lien Dang, vice president of product for StackRox, says by exclusively focusing the company’s container security efforts on Kubernetes, it becomes possible

The PCI DSS compliance framework dates back to the mid-2000s, well before anyone was talking about containers. This does not mean, however, that PCI compliance doesn’t affect you if you’re running a containerized environment. Although the PCI DSS framework doesn’t deal in specific detail with containers, a containerized infrastructure presents

One of the most significant issues cybersecurity teams must come to terms with in 2019 is how container security should be implemented and maintained. The days when cybersecurity teams were solely responsible for implementing cybersecurity controls are long past. In fact, as cybersecurity becomes more distributed across the enterprise, the

Container security is rapidly becoming a major concern as containers start to proliferate across the enterprise. A survey of 311 cybersecurity professionals conducted by Dimensional Research on behalf of Tripwire, a provider of IT security software and service, finds that 75 percent of organizations that had more than 100 containers

This won’t come as a surprise, but technology is evolving quickly. The transition from physical servers to virtual servers, to virtual servers in the cloud, to DevOps tools and practices, to microservices has all happened in a relatively short period time. Each shift has introduced significant benefits, but one of

With new cyberattacks occurring week by week, security is now an extremely critical focus for all engineering teams. It’s also influencing the creation of new ways to prevent attacks. Crypto anchors, one such new method, just may be the key to thwart tomorrow’s security breaches. A theory coined by security

As we close out 2018, we at Container Journal wanted to highlight the five most popular articles of the year. Following is the fourth in our weeklong series of the Best of 2018. If you use Kubernetes, you know how much it can increase development velocity and reduce operational complexity.

How do you keep containers secure? That’s a big question, especially given how many distinct components you have to secure in a containerized environment. But it’s a question that has clear answers. Keep reading for a primer on security best practices for every component involved in your container infrastructure. Container

A recently identified security flaw in Kubernetes container orchestration software is adding fuel to a simmering debate over how the Kubernetes update process should be managed. The security flaw involves a privilege escalation issue that was found that affects all versions of the Kubernetes API server. A cybercriminal could use

The HIPAA compliance framework is somewhat infamous for setting high-level requirements regarding healthcare data and privacy without recommending specific ways of meeting those requirements. That tendency leaves many developers, admins and DevOps engineers wondering how, exactly, to comply with HIPAA. If you find yourself in that situation, keep reading. This

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.